Behavioral task
behavioral1
Sample
8a8a7a506fd57bde314ce6154f2484f280049f2bda504d43704b9ad412d5d618.doc
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
8a8a7a506fd57bde314ce6154f2484f280049f2bda504d43704b9ad412d5d618.doc
Resource
win10v2004-20230915-en
General
-
Target
12010346299.zip
-
Size
88KB
-
MD5
417b61086003ac5e2d525974fef71bb0
-
SHA1
ae4a6504f5257bf941aa5c6694b903d318fe20c7
-
SHA256
69954544dc7038bbf22b00ccedc2bef25d1ae176ffcf845d9f55f688393877e6
-
SHA512
383f92f1f855fee994df1dc7501d80f5069ffff212230e3ecd042ecd8bd7fec296e79de611df05c81073429251f06de5f46d96e5a45d2370f51e8074f06d919d
-
SSDEEP
1536:xTfY99lMzZdefNMZtfuIAmpLOIWDC9Xumvb67Oboog2i6TWCCaU5CX9feHuh:ZfG9lMzZ+MZ99AmpI+9XP4Uoog2iJ495
Malware Config
Signatures
-
Office macro that triggers on suspicious action 1 IoCs
Office document macro which triggers in special circumstances - often malicious.
resource yara_rule static1/unpack001/8a8a7a506fd57bde314ce6154f2484f280049f2bda504d43704b9ad412d5d618 office_macro_on_action -
resource static1/unpack001/8a8a7a506fd57bde314ce6154f2484f280049f2bda504d43704b9ad412d5d618
Files
-
12010346299.zip.zip
Password: infected
-
8a8a7a506fd57bde314ce6154f2484f280049f2bda504d43704b9ad412d5d618.doc windows office2003
ThisDocument
UserForm1